It is the responsibility of the Appliance Administrator to add or remove trusted root certificates to the Safeguard for Privileged Passwords Appliance. If you are going to verify the server certificate, then you do need a certificate from the server certificates chain of trust in Trusted Certificates.
- If you uploaded a syslog client certificate with a private key, you may need to upload the certificate's root CA to the list of trusted certificates. For more information, see Syslog Client Certificate.
- An SSL/TLS certificate must be trusted to resolve the chain of authority. For an SSL/TSL certificate, when Safeguard for Privileged Passwords connects to an asset that has the Verify SSL Certificate option enabled, the signing authority of the certificate presented by the asset is compared to the certificates in the trusted certificate store. For more information, see Verify SSL Certificate.
Go to the following selection, based on your client:
- web client: Navigate to Settings | Certificates | Trusted CA Certificates.
- desktop client: Navigate to Settings | Certificates | Trusted Certificates.
Select a certificate to display the following information for the user-supplied certificates added to the trusted certificate store.
|Subject||The name of the subject (such as user, program, computer, service or other entity) assigned to the certificate when it was requested.|
|The name of the certificate authority (CA) that issued the certificate.|
|A unique hash value that identifies the certificate.|
|Invalid Before||A "start" date and time that must be met before a certificate can be used.|
|Expiration Date||The date and time when the certificate expires and can no longer be used.|
Toolbar options follow.
|Upload New Trusted CA Certificate||
Add a trusted certificate.
Delete the selected certificate.
Update the list of certificates.